Gibson> Download Garbage
  • Statement of purpose
  • Techniques
    • Intelligence Gathering
      • O365 Tenant ID
      • Internal domain enumeration
      • O365 email enumeration
      • Passive nmap (smap)
      • Large IP list handling
      • Host Enumeration
    • Initial Access
      • Mail scanning
      • VBA
    • Execution
      • DLL Hijacking
      • Windows LOLBINS
        • DLLs - LOLBIN Execution
        • Executables - LOLBIN Execution
        • Scripts - LOLBIN Execution
    • Privilege Escalation
      • Windows
        • Initial Enumeration
      • Linux
    • Defense Evasion
      • Clear windows event logs
      • Bypassing proxies and firewalls
      • Microsoft Windows Defender
    • Credential Access
      • Extract credentials from LSASS dump
      • Extract credentials from registry hives
      • LSA secrets extraction
      • Dumping LSASS.exe
      • Dumping registry hives
      • Dump the domain (Domain Controllers)
      • Browser cookies & passwords
      • Wi-Fi passwords
      • Clipboard
    • Infrastructure
    • Web application testing
      • XSS - Cross site scripting
        • Weaponising XSS
    • Other
      • Buffer Overflow resources
        • Buffer Overflow Python Template
        • Buffer Overflow Python Fuzzer
      • C Reverse Shell
      • Creating Tiered Storage in Windows 10
      • Default Credentials
    • Red Team Infrastructure
      • Cobalt Strike Team Server
      • Pre-redirector (free domains!)
      • HTTPS Redirector
      • Multi functional WebApp
      • Malleable C2 profiles
      • Gophish Docker reverse proxy
    • Malware
  • Tools
    • Tools
Powered by GitBook
On this page
  • Template functions
  • Technique examples
  • Malware examples

Was this helpful?

  1. Techniques

Malware

TBC - Just some handy reference links for now

PreviousGophish Docker reverse proxyNextTools

Last updated 2 years ago

Was this helpful?

Template functions

Technique examples

Malware examples

UACME/Source/Shared at master · hfiref0x/UACMEGitHub
GitHub - vxunderground/VX-API: Collection of various malicious functionality to aid in malware developmentGitHub
GitHub - TheAlgorithms/C-Plus-Plus: Collection of various algorithms in mathematics, machine learning, computer science and physics implemented in C++ for educational purposes.GitHub
GitHub - TheAlgorithms/C: Collection of various algorithms in mathematics, machine learning, computer science, physics, etc implemented in C for educational purposes.GitHub
GitHub - skahwah/encrypt: Pseudorandom AES-256 encryption designed to protect shellcode and arbitrary strings. C# and C/C++ compatible.GitHub
VXUG-Papers/Hells Gate at main · vxunderground/VXUG-PapersGitHub
GitHub - rad9800/WTSRM: WTSRMGitHub
GitHub - Allevon412/TeamsImplantGitHub
GitHub - cribdragg3r/Alaris: A protective and Low Level Shellcode Loader that defeats modern EDR systems.GitHub
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo